Abstract

In recent times, security and privacy at the physical (PHY) layer has been a major issue of several communication technologies which comprise the internet of things (IoT) and mostly, the emerging fifth-generation (5G) cellular network. The most real-world PHY security challenge stems from the fact that the passive eavesdropper’s information is unavailable to the genuine source and destination (transmitter/receiver) nodes in the network. Without this information, it is difficult to optimize the broadcasting parameters. Therefore, in this research, we propose an efficient sequential convex estimation optimization (SCEO) algorithm to mitigate this challenge and improve the security of physical layer (PHY) in a three-node wireless communication network. The results of our experiments indicate that by using the SCEO algorithm, an optimal performance and enhanced convergence is achieved in the transmission. However, considering possible security challenges envisaged when a multiple eavesdropper is active in a network, we expanded our research to develop a swift privacy rate optimization algorithm for a multiple-input, multiple-output, multiple-eavesdropper (MIMOME) scenario as it is applicable to security in IoT and 5G technologies. The result of the investigation show that the algorithm executes significantly with minimal complexity when compared with nonoptimal parameters. We further employed the use of rate constraint together with self-interference of the full-duplex transmission at the receiving node, which makes the performance of our technique outstanding when compared with previous studies.

Highlights

  • With the recent swift advancement of wireless communication networks and the advent of the fifth generation (5G) cellular network, interconnected devices are embedded into the environment through the internet of things (IoT) paradigm to enhance constant quality of service (QoS) and connectivity [1]

  • We explore the privacy capacity of wireless transmitting networks in several schemes relating to full-duplex jamming

  • Subject to both the transmission rate and power constraints, we considered and implemented an efficient power allocation optimization algorithm for enhancing privacy capacity in a three-node transmitting network and in a real life MIMOME scenario

Read more

Summary

Introduction

With the recent swift advancement of wireless communication networks and the advent of the fifth generation (5G) cellular network, interconnected devices are embedded into the environment through the IoT paradigm to enhance constant quality of service (QoS) and connectivity [1]. Security of wireless transmissions has become a vital concern [2]. In wireless technology, security risks are unavoidably inherent. Sensors 2020, 20, 2609 the major cradle of security risks in 5G wireless communications. The resources (e.g., battery) of most IoT devices (such as handheld/mobile communicating devices) are constrained, resulting in the devices having limited power for transmission, which may warrant the use of frailer cryptographic techniques as power savers. Devices may be prone to several attacks by some prevailing adversaries

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.